Search Results - (( features extraction generating algorithm ) OR ( java application optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Finger Vein Recognition Using Pattern Map As Feature Extraction by Teoh, Saw Beng

    Published 2012
    “…Algorithms such as Gabor Filter, Local Line Binary Pattern (LLBP) and Principal Component Analysis (PCA) have been proposed in recent study to extract finger vein features. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Euclidean Distance, Pearson Correlation and Matching Matrix were used to measure the performance of the feature extraction and clustering methods. Recognition software achieved 87.14%, EPD algorithm achieved 73.57% and HMT algorithm achieved 74.30%) prediction accuracy with OTs. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Facial features point localization using modified SIFT scale space / Zulfikri Paidi by Paidi, Zulfikri

    Published 2020
    “…Surface change creates high-dimensional data during feature extraction work. There are many algorithms proposed for recognition of facial expressions, including SIFT algorithms that are considered superior in performing feature extraction. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Features extraction based on fuzzy clustering and segmentation onto the motion region for medium field surveillance application by Maliki, Mohamad Nansah, Abu Bakar Al-Attas, Syed Abdul Rahman

    Published 2004
    “…Instead of using blob analysis, we believe that fuzzy based clustering algorithm, can also be used to generate different clusters. …”
    Get full text
    Get full text
    Get full text
    Book Section
  10. 10

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    A YOLO-based deep learning model for Real-Time face mask detection via drone surveillance in public spaces by A. Mostafa, Salama, Ravi, Sharran, Zebari, Dilovan Asaad, Zebari, Nechirvan Asaad, Mohammed, Mazin Abed, Nedoma, Jan, Martinek, Radek, Deveci, Muhammet, Ding, Weiping

    Published 2024
    “…The feature enhancement task is performed by applying the Path Aggregation Network (PANet) and Spatial Pyramid Pooling Network (SPPNet) algorithms, which are deployed to enhance the extracted and generated features. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    DNA enhancer prediction using machine learning techniques with novel feature representation by Fong, Pui Kwan

    Published 2016
    “…The content feature is unable to represent the complex properties of deoxyribonucleic acid (DNA) sequences; 2) the k-mer feature represents only the global property of DNA sequences but not the localized property; and 3) lack of feature extraction, generation and selection techniques in the algorithm design. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Multinomial logistic regression probability ratio-based feature vectors for Malay vowel recognition by Atanda, Abdulwahab Funsho

    Published 2021
    “…This study was carried out in four phases which are pre-processing and feature extraction, best regression coefficients generation, feature transformation, and performance evaluation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    HEP-2 CELL FEATURE EXTRACTION USING WAVELET AND INDEPENDENT COMPONENT ANALYSIS by NUR THANIA AWATIF BINTI MOHAMAD ROSDI, NUR THANIA AWATIF BINTI MOHAMAD ROSDI

    Published 2013
    “…This work will focus more on feature extraction using Wavelet and Independent Component Analysis (ICA). …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…Further studies can be made by using the same algorithm, but focusing more on the image enhancement and the feature extraction methods to improve the quality of the extraction of fingerprints.…”
    Get full text
    Get full text
    Thesis
  18. 18

    A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS by Thayaaleni, Rajandran

    Published 2019
    “…Lastly, the classification result is generated. The proposed project will extract the features of system calls, network packets, CPU usage and battery usage of the application. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  19. 19

    Image Stitching Of Aerial Footage by Ng, Wei Haen

    Published 2021
    “…ScaleInvariant Feature Transform (SIFT) approach is used to detect and describe the feature points of the extracted frames. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN by SARI, YUNITA SARI

    Published 2011
    “…The second contribution is the extraction pattern construction. Each named entity candidate will be assigned with an extraction pattern constructed from a set of word and syntactical feature. …”
    Get full text
    Get full text
    Thesis